OpenSLP through version 2.0.0 is vulnerable to a double freeing of memory that causes a crash in the slp_buffer:SLPBufferRealloc() function. A remote unauthenticated attacker could exploit this to cause a denial of service or potentially execute arbitrary code.
Created openslp tracking bugs for this issue: Affects: fedora-all [bug 1596451]
Possibly related to CVE-2017-17833
*** This bug has been marked as a duplicate of bug 1572166 ***
Statement: This flaw was found to be a duplicate of CVE-2017-17833. Please see https://access.redhat.com/security/cve/CVE-2017-17833 for information about affected products and security errata.